The product does not verify, or incorrectly verifies, the cryptographic signature for data.

Impact: Gain Privileges or Assume IdentityModify Application DataExecute Unauthorized Code or Commands
An attacker could gain access to sensitive data and possibly execute unauthorized code.
java