Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Returning a Mutable Object to an Untrusted Caller

Sending non-cloned mutable data as a return value may result in that data being altered or deleted by the calling function.