...
Failing to create a copy of a mutable input may enable an attacker to exploit a TOCTOU vulnerability and at other times, expose internal mutable components to untrusted code.
Guideline Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
FIO00OBJ14-J | medium | probable | high | P4 | L3 |
Automated Detection
TODO
Related Vulnerabilities
...