...
Allowing tainted inputs in privileged operations can lead to privilege escalation attacks.
Guideline Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
SEC03-J | high | likely | low | P27 | L1 |
...
...
Allowing tainted inputs in privileged operations can lead to privilege escalation attacks.
Guideline Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
SEC03-J | high | likely | low | P27 | L1 |
...