Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Risk Assessment

An adversary could can create multiple environment variables with the same name. If the program checks one copy but uses another, security checks may be circumvented.

...