...
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
SEC06-J | high | probable | medium | P12 | L1 |
Automated Detection
TODO
Related
...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Related Guidelines
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="91f7e49c49e6f9e8-90b28cd5-4795407d-88f0bd1c-d51ae21ee03b460d4e255f36"><ac:plain-text-body><![CDATA[ | [ISO/IEC TR 24772:2010 | http://www.aitcnet.org/isai/] | "Authentication Logic Error [XZO]" | ]]></ac:plain-text-body></ac:structured-macro> |
CWE ID 302, "Authentication Bypass by Assumed-Immutable Data" | ||||
| CWE ID 470, "Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')" |
...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="110b23e2b5a8be82-a7373e3d-4c9b408e-903686e6-174b8d8c474d6e7b0fa64e36"><ac:plain-text-body><![CDATA[ | [[Sterbenz 2006 | AA. Bibliography#Sterbenz 06]] | ]]></ac:plain-text-body></ac:structured-macro> |
...