Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Invoking an external program in an attacker-controlled environment is dangerous.

Rule Recommendation

Severity

Likelihood

Remediation Cost

Priority

Level

ENV03-A

2 (medium)

2 (probable)

2 (medium)

P8

L2

...