While analyzing the security of a web application, you find that it allows an externally-supplied input to serve as an argument for a program that is under its own control.
What would be the likelihood of exploit attributed to this vulnerability?
Options
- Low
- Medium
- High
- It cannot be determined