...
An adversary could create several environment variables with the same name. If the program checks against one copy, but actually uses another, this could be a clear problem.
Rule Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
ENV02-A | 2 (medium) | 1 (unlikely) | 3 (low) | P6 | L2 |
...