Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Failure to define wrappers around native methods can allow unprivileged callers to invoke them and exploit inherent vulnerabilities such as the ones resulting from invalid input validation.

Rule Guideline

Severity

Likelihood

Remediation Cost

Priority

Level

SEC18- J

medium

probable

high

P4

L3

...