A security vulnerability that allows attackers to execute malicious code in a targeted device remotely. The attacker scans the internet for detecting vulnerabilities that can support the attack and then injects the malicious code using the language of the targeted application.