...
Using path names from untrusted sources without first canonicalizing them and then validating them can result in directory traversal attacks.
Guideline Recommendation | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
FIO04IDS21-J | medium | unlikely | medium | P4 | L3 |
Related Vulnerabilities
...