Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: not ignoring, violating

...

Likelihood—How likely is it that a flaw introduced by ignoring violating the rule can lead to an exploitable vulnerability?

...