CAPEC-175: Code Inclusion
An adversary exploits a weakness on the target to force arbitrary code to be retrieved locally or from a remote location and executed. This differs from code injection in that code injection involves the direct inclusion of code while code inclusion involves the addition or replacement of a reference to a code file, which is subsequently loaded by the target and used as part of the code of some application.
Severity
Very High
Likelihood
Medium
14
/ 100
low-risk
Active Threat
13/50 · Low
Exploit Availability
1/50 · Minimal