While analyzing the security for an application you find that it allows an externally supplied input to serve as an argument for a program that is under its own control.
What would be the likelihood of exploit attributed to this vulnerability?
Options
- Low
- Medium
- High
- It cannot be determined