Sign in
chromium
/
external
/
github.com
/
google
/
error-prone
/
refs/heads/master
/
.
/
docs
/
bugpattern
/
BanClassLoader.md
blob: 873c42e24a777c5c18b164ffe870cc126116e9c3 [
file
] [
view
] [
edit
]
The
Java
class
loading
APIs
can lead to remote code execution vulnerabilities
if
not
used carefully
.
Interpreting
potentially untrusted input
as
bytecode can
give an attacker control of the application
.