Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Failure to define wrappers around native methods can allow unprivileged callers to invoke them and thus exploit inherent vulnerabilities such as those resulting from invalid inputs.

Guideline Rule

Severity

Likelihood

Remediation Cost

Priority

Level

SEC18-J

medium

probable

high

P4

L3

...