...
Invoking an external program in an attacker-controlled environment is dangerous.
Rule Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level |
|---|---|---|---|---|---|
ENV03-A | 2 (medium) | 2 (probable) | 2 (medium) | P8 | L2 |
...
...
Invoking an external program in an attacker-controlled environment is dangerous.
Rule Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level |
|---|---|---|---|---|---|
ENV03-A | 2 (medium) | 2 (probable) | 2 (medium) | P8 | L2 |
...